Paper
20 May 2011 Advancing botnet modeling techniques for military and security simulations
Sheila B. Banks, Martin R. Stytz
Author Affiliations +
Abstract
Simulation environments serve many purposes, but they are only as good as their content. One of the most challenging and pressing areas that call for improved content is the simulation of bot armies (botnets) and their effects upon networks and computer systems. Botnets are a new type of malware, a type that is more powerful and potentially dangerous than any other type of malware. A botnet's power derives from several capabilities including the following: 1) the botnet's capability to be controlled and directed throughout all phases of its activity, 2) a command and control structure that grows increasingly sophisticated, and 3) the ability of a bot's software to be updated at any time by the owner of the bot (a person commonly called a bot master or bot herder.) Not only is a bot army powerful and agile in its technical capabilities, a bot army can be extremely large, can be comprised of tens of thousands, if not millions, of compromised computers or it can be as small as a few thousand targeted systems. In all botnets, their members can surreptitiously communicate with each other and their command and control centers. In sum, these capabilities allow a bot army to execute attacks that are technically sophisticated, difficult to trace, tactically agile, massive, and coordinated. To improve our understanding of their operation and potential, we believe that it is necessary to develop computer security simulations that accurately portray bot army activities, with the goal of including bot army simulations within military simulation environments. In this paper, we investigate issues that arise when simulating bot armies and propose a combination of the biologically inspired MSEIR infection spread model coupled with the jump-diffusion infection spread model to portray botnet propagation.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sheila B. Banks and Martin R. Stytz "Advancing botnet modeling techniques for military and security simulations", Proc. SPIE 8060, Modeling and Simulation for Defense Systems and Applications VI, 80600I (20 May 2011); https://doi.org/10.1117/12.882892
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computing systems

Internet

Systems modeling

Instrument modeling

Standards development

Computer simulations

RELATED CONTENT

Research on enterprise network security system
Proceedings of SPIE (May 06 2022)
Computer network management based on TMN
Proceedings of SPIE (August 29 2002)
Adaptive Bayesian networks
Proceedings of SPIE (August 20 1992)

Back to Top